CN109428899A - File security transfer management method and system - Google Patents
File security transfer management method and system Download PDFInfo
- Publication number
- CN109428899A CN109428899A CN201710719512.7A CN201710719512A CN109428899A CN 109428899 A CN109428899 A CN 109428899A CN 201710719512 A CN201710719512 A CN 201710719512A CN 109428899 A CN109428899 A CN 109428899A
- Authority
- CN
- China
- Prior art keywords
- file
- client
- cryptographic hash
- transmitted
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of file security transfer management method and system, this method comprises: client and server communicates to connect;The server information of file existing for query service device end returns client;Encryption and compression processing are carried out according to data information of the setting of client to file, is sent to server end;Server end carries out decompression and decryption processing to file;Client sends integrity request, the Hash value information of checking file after received server-side integrity request, and returns client;Judge the integrality of file transmission.The advantage is that: self-defining data communication protocol, supports communication interface flexible expansion;Customized big file Cut Stratagem solves the security risk in document transmission process using encryption concurrent transmission, prevents from causing to divulge a secret after data are intercepted;The problems such as data integrity checking mechanism is provided using MD5 method of calibration, the damage of file packet loss is prevented, is tampered.
Description
Technical field
The present invention relates to information technology fields, more particularly, to a kind of file security transfer management method and system.
Background technique
File transmission can be all used under informatization process, every profession and trade, each business scenario, file transmits (File
Transfer), refer to by a file or in which a part pass to another computer system from a computer system,
Middle FTP, HTTP are common File Transfer Protocol.
The full name of FTP is that File Transfer Protocol (File Transfer Protocol) is exactly specifically used to as its name suggests
Transmit the agreement of file.FTP is currently still widely used, but also faces many problems in use, such as: safety
Strategy is not perfect, safety is poor, and password and file content all use plaintext transmission, it is possible to create undesirable eavesdropping;Number
It is unreasonable according to transmission mode, it will cause file corruption etc..In short, it is one neither dangerous, it is also not unfriendly, and efficiency
Low agreement certainly will be substituted.
The full name of HTTP is hypertext transfer protocol (HyperText Transfer Protocol), and http protocol uploads
It is more suitable for WEB application and small documents uploads (within 10M), is not suitable for big file uploading, and safety is also poor, such as:
Using in plain text (not encrypting), content may be ravesdropping for communication;The identity for verifying communication party, it is therefore possible to meet with camouflage;Nothing
Method proves the integrality of message, and it is possible to distorted.
Currently, file uploads, download technology comparative maturity, there is the file server based on File Transfer Protocol, such as common file
Server S erver-U, FileZilla, VSFTP, IISFTP etc.;Also there is the component based on Transmission Control Protocol, relevant component also compares
It is relatively abundant, it can realize common scenarios, the upload of ordinary file and down operation, but there is also some for these components or tool
Disadvantage: cannot support the client of high concurrent to connect, and can not achieve and handle multiple concurrent asynchronous I/O requests;Safety is compared
Difference, data transmit unencryption or cipher mode is relatively simple, and data transmission is possible to be ravesdropping;Transmission efficiency is low, does not support
It concurrently uploads, when Documents Comparison is big, uploading speed is slow, and transmission is unstable, or even Caton situation occurs;Some transmission groups
Part does not support breakpoint transmission, does not support the breakpoint transmission of big file especially;The data integrity audit function cannot be provided, text is worked as
Part cannot find to correct in time when damage.
In the Chinese invention patent application application No. is CN201510467555.1, it is non-depressed to provide a kind of safe transmission
The encryption and decryption method of contracting file, belong to data security arts, execute ciphering process by AES or des encryption algorithm,
Encryption file header structure and file item sequence are generated, file content to be encrypted is then read in a manner of multi thread and multi task.The hair
Bright has the beneficial effect that: 1. have the ability for quickly encrypting multiple file directorys and single file;2. there is fast decryption and release
Release the ability that encryption document determines file;3. the ability supported with all files format;4. based on DSA signature algorithm and
AES encryption algorithm, safety are higher.But the transmission file of this form is unable to compression transmission, is not suitable for the biography of larger file
It is defeated.
In the Chinese invention patent application application No. is CN201410744447.X, provide a kind of based on concurrent transmission mould
The big file uploading method of formula, belongs to computer application technology, which includes: document analysis unit, concurrent transmission list
Member, analysis corrector, file reduction unit;Big file reading and converting is byte stream in document analysis unit and split by client
For the identical multiple byte streams of size, concurrent transmission unit concurrently sends these byte streams, file reception end to file reception end
It receives to be reconfigured byte stream by file reduction unit according to sequence notation after file stream and is reduced into original file.But this
The transmission of kind form needs to split big file, reduces the stability and reliability of file transmission.
In the Chinese invention patent application application No. is CN201310347968.7, disclose a kind of based on File Transfer Protocol
The method for realizing super large file multithreading breaking point uploading includes the following steps: that S1, ftp client establish multithreading connection, realizes
The multithreading of file uploads;S2, file is divided into multiple pieces, distributes to different threads and upload, when some thread has uploaded
After one blocks of files, new blocks of files of reallocating gives the thread;S3, it is not yet uploaded using each blocks of files of multi-thread concurrent upload
Part, avoid the operation for uploading the data portion transmitted again;S4, ftp client additionally set up a thread, specially
For recording provisional configuration the file information in real time.The invention is suitable for the FTP upload service of super large file, passes through multi-thread concurrent
The method of upload can effectively shorten and upload super large file to the time needed for ftp server;By the method for breaking point uploading,
It avoids uploading the data portion transmitted again, reduces transmission quantity, further save and upload super large file to ftp server
Time.But the file transmission of this form can not provide the data integrity audit function, cannot be timely when file corruption
It was found that amendment.
In the Chinese invention patent application application No. is CN201210581891.5, it is related to a kind of multifile real-time synchronization
The method of transmission, specifically includes the following steps: step 1: useful data is sent to receiving end by starting transmitting terminal, transmitting terminal;Step
Rapid 2: the file that receiving end is arranged saves contents and listening port;Step 3: receiving end receives the data that transmitting terminal is sent.This hair
The bright mode using one process single thread, system resources consumption are few;Data are transmitted by TCP connection, it is ensured that data were transmitted can
By property and timeliness;The integrality of data can be also ensured that when process restarts by saving breakpoint file;Deployment is simple, increases
Add the file to be synchronized, it is only necessary to it is stored in fixed catalogue, it is flexibly simple;Single treatment is all that chunk data carries out, energy
The read-write efficiency and network transmission efficiency performance for preferably utilizing disk, improve processing speed.Avoid data in database
Directly operate, can be at least 10 times faster than database manipulation with file mode, reduce the risk of loss of data.But this file
Synchronization transfer method does not have good compatibility and scalability, is restricted in practical applications.
Therefore, it is necessary to develop a kind of file security transfer management method and system, it can reach highly-safe, make file
It transmits more efficient, stable, reliable, and is capable of providing the data integrity audit function, it can modified purpose in time when file corruption.
The information for being disclosed in background of invention part is merely intended to deepen the reason to general background technique of the invention
Solution, and it is known to those skilled in the art existing to be not construed as recognizing or imply that the information is constituted in any form
Technology.
Summary of the invention
The invention proposes a kind of file security transfer management method and system, can be real by cryptographic Hash check addition
The complete transmission of data is showed.
According to an aspect of the invention, it is proposed that a kind of file security transfer management method, which comprises
Client and server establishes communication connection, and the client sends file upload request;
After the server end receives request, the server information of the file existing for the server end is inquired,
Return the client;
The client reads the data information of the file according to the server information, according to the client
It is arranged and encryption and compression processing is carried out to the data information of the file, is sent to the server end;
The server end carries out decompression and decryption processing to the file;
The client sends integrity request, examines the file after integrity request described in the received server-side
Hash value information, and return the client;
The Hash value information that the cryptographic Hash of client comparison local file and the server end are returned, described in judgement
The integrality of file transmission.
Preferably, the integrality for judging file transmission includes:
When the cryptographic Hash of the local file and the Hash value information of the return are consistent, the file is completely uploaded;
When the cryptographic Hash of the local file and the Hash value information of the return are inconsistent, the file is lost, described
Client request uploads the file again.
Preferably, the server information includes the letter for uploading the information of segment and having received the initial position of segment
Breath.
Preferably, when the file is determined as small documents, single thread transmission is executed.
Preferably, the method for the single thread transmission includes:
The cryptographic Hash for calculating file to be transmitted is stored in the client, and the file to be transmitted is encrypted and pressed
Contracting;
When the file to be transmitted uploads, restore again after network interruption, the file to be transmitted can execute breakpoint transmission;
The received server-side is decrypted it and decompresses to the file to be transmitted, generates the cryptographic Hash of return;
The cryptographic Hash for calculating file to be transmitted and the cryptographic Hash of the return compare, and carry out the file to be transmitted
Integrality judgement.
Preferably, when the original document is determined as big file, multi-threaded parallel transmission is executed.
Preferably, the method for executing the multi-thread transmission includes:
The cryptographic Hash for calculating big file is stored in the client, by the big file division at multiple file fragments;
The multiple file fragment is encrypted and compressed, the server end is sent to;
The multiple file fragment is decrypted and is decompressed in the server end, and the multiple file fragment is closed
And generate and restore big file, return the cryptographic Hash of the big file of reduction;
The cryptographic Hash of the big file and the cryptographic Hash of the big file of reduction compare, and carry out the integrality of the big file
Judgement.
Preferably, the cryptographic Hash is calculated by the Message Digest 5.
Preferably, the server end uses IOCP Communication Model.
According to another aspect of the invention, it is proposed that a kind of file security transmission and management system, the system comprises:
Client uploads file to be transmitted;
Server end, the server end and the client, which are established, to be communicated to connect;
Monitoring unit, the monitoring unit receive the upload request of client file to be transmitted;
Processing unit, the processing unit handle the upload request of the file to be transmitted, calculate described to be passed
Cryptographic Hash after defeated file upload;
Storage unit, the storage unit store the cryptographic Hash of the file to be transmitted;
Judging unit, the judging unit judge the size of the file to be transmitted, indicate the client executing single line
Journey transmission executes multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the storage unit with the cryptographic Hash in the processing unit.
A kind of file security transfer management method and system according to the present invention, the advantage is that: self-defining data communicates
Agreement supports communication interface flexible expansion;Customized big file Cut Stratagem solves electronics text using encryption concurrent transmission
Security risk in part transmission process prevents from causing to divulge a secret after data are intercepted;It is complete that data are provided using MD5 method of calibration
Property checking mechanism, prevent the damage of file packet loss, the problems such as being tampered.
Method and system of the invention has other characteristics and advantages, these characteristics and advantages are attached from what is be incorporated herein
It will be apparent in figure and subsequent specific embodiment, or will be in the attached drawing and subsequent specific implementation being incorporated herein
It is stated in detail in example, these the drawings and specific embodiments are used together to explain specific principle of the invention.
Detailed description of the invention
Exemplary embodiment of the present is described in more detail in conjunction with the accompanying drawings, of the invention is above-mentioned and other
Purpose, feature and advantage will be apparent, wherein in exemplary embodiments of the present invention, identical appended drawing reference is usual
Represent same parts.
Fig. 1 shows a kind of framework of file security transfer management method of an exemplary embodiment according to the present invention
Schematic diagram.
Fig. 2 shows a kind of exemplary diagrams of small documents method for uploading according to an embodiment of the invention.
Fig. 3 shows a kind of exemplary diagram of big file uploading method according to an embodiment of the invention.
Specific embodiment
The present invention will be described in more detail below with reference to accompanying drawings.Although showing the preferred embodiment of the present invention in attached drawing,
However, it is to be appreciated that may be realized in various forms the present invention and should not be limited by the embodiments set forth herein.On the contrary, providing
These embodiments are of the invention more thorough and complete in order to make, and can will fully convey the scope of the invention to ability
The technical staff in domain.
The present invention provides a kind of file security transfer management methods, comprising:
Client and server establishes communication connection, and client sends file upload request;
After server end receives request, the server information of file existing for query service device end returns client;
Client reads the data information of file according to server information, according to the setting of client to the data of file
Information carries out encryption and compression processing, is sent to server end;
Server end carries out decompression and decryption processing to file;
Client sends integrity request, the Hash value information of checking file after received server-side integrity request, and
Return client;
The Hash value information that client compares the cryptographic Hash of local file and server end is returned, judges the complete of file transmission
Whole property.
Further, judge file transmission integrality include:
When the cryptographic Hash of local file and the Hash value information of return are consistent, file is completely uploaded;
When the cryptographic Hash of local file and the Hash value information of return are inconsistent, file is lost, client request again on
Transmitting file.
Preferably, server information includes the information for uploading segment and the initial position for having received segment
Information.
Pretreatment memory is dynamically distributed according to the configuration file of server-side when server end starts, creates file transfer services
Thread pool, and realize the dynamic allocation and monitoring of thread pool memory.By monitor service receive client upload, downloading, merging,
The request such as integrity verification receives the request processing service distributing to request dynamic after requesting and pre-allocating in thread pool and completes phase
It should handle and return information is to client.
Preferably, cryptographic Hash is carried out by Message Digest 5 (Message Digest Algorithm, MD5)
It calculates.
MD5 algorithm has the advantage that
Preferable compressibility: the MD5 value length of the data of random length, calculating is fixed;
It is easy to calculate: calculating MD5 value from former data and be easy to;
Good anti-modification: making any change to former data, even only modifying 1 byte, obtained MD5 value is all
There is very big difference;
Strong impact resistant: known original data and its MD5 value are wanted to find data (the i.e. forgery number with identical MD5 value
According to) it is very difficult.
Data integrity checking mechanism is provided using MD5 method of calibration, prevents file packet loss from damaging, being tampered etc. and asks
Topic.
Preferably, server end uses IOCP Communication Model.
IOCP full name I/O Completion Port, Chinese are translated into I/O completing port, and IOCP is an asynchronous I/O
API, I/O event efficiently can be notified to have the advantage that application program using IOCP by it
Help the memory pool (related with Chong Die I/O technology) for maintaining to reuse;It is negative that thread creation/termination is deleted in removal
Load;Conducive to management, thread is distributed, control is concurrent, the thread context switching of minimum;Optimize thread scheduling, improves CPU and interior
Deposit the hit rate of buffering.
Self-defining data communication protocol supports communication interface flexible expansion.
The present invention also provides a kind of file security transmission and management systems, comprising:
Client uploads file to be transmitted;
Server end, server end and client, which are established, to be communicated to connect;
Monitoring unit, monitoring unit receive the upload request of client file to be transmitted;
Processing unit, processing unit handle the upload request of file to be transmitted, after calculating file upload to be transmitted
Cryptographic Hash;
Storage unit, storage unit store the cryptographic Hash of file to be transmitted;
Judging unit, judging unit judge the size of file to be transmitted, the transmission of instruction client executing single thread or execution
Multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the cryptographic Hash and processing unit in storage unit.
Preferably, file threshold value is equipped in judging unit, when the size of file to be transmitted is less than file threshold value,
Single thread transmission is executed, when the size of file to be transmitted is not less than file threshold value, executes multi-threaded parallel transmission.
Wherein, file threshold value is usually set to 500M.
Customized big file Cut Stratagem solves the safety in electronic document transmission process using encryption concurrent transmission
Hidden danger prevents from causing to divulge a secret after data are intercepted.
Embodiment
Fig. 1 shows a kind of framework of file security transfer management method of an exemplary embodiment according to the present invention
Schematic diagram.
As shown in Figure 1, a kind of file security transfer management method of the invention, comprising:
Client and server establishes communication connection, uploads file request, and server end receives to ask by the service of monitoring
Requesting processing is transferred to handle after asking, i.e. file request processing service, whether query service device end has existed point of file
Piece file (clip file), and the information such as initial position of received slicing files, and return to reception information, upload request
Pass through;
Client reads the data of the corresponding position of the slicing files of upper transmitting file according to the server information received
Information carries out encryption and compression processing to data flow, according to data flow of the setting of client to file, and is sent to server
End, the data flow of file is decrypted the data reception service of server end and decompression processing, by the data convert of file, and
It is written in file fragment;
After entire file is transmitted, client, which is sent, merges file request, received server-side to merging file request
The file fragment received is serviced by file mergences afterwards and merges file;
After the completion of file mergences, client sends integrity request as needed, by testing after received server-side request
The MD5 information of service acquisition file is demonstrate,proved, and returns client, client obtains the clothes of MD5 information and return according to local file
The MD5 information of business device file compares;
Front and back information is consistent, then file is transmitted, if it is inconsistent, there is mistake, client in supporting paper transmission
End can request again upper transmitting file.
Server end is additionally provided with judgement service, compares to the size and given threshold of upper transmitting file, when upper transmitting file
When less than given threshold, judge that upper transmitting file as small documents, executes single thread transmission, when upper transmitting file is not less than given threshold
When, judge that upper transmitting file as big file, executes multi-threaded parallel transmission.Wherein, given threshold is 500M in the present embodiment.
Fig. 2 shows a kind of exemplary diagrams of small documents method for uploading according to an embodiment of the invention.
As shown in Fig. 2, method for uploading when upper transmitting file is small documents, comprising:
Client is connected to server end;
File transmission prepares: judging file size, the cryptographic Hash of calculation document (MD5 algorithm), is judged as in the present embodiment
Small documents;
File is encrypted, is compressed;
Based on self-defining data communication protocol IOCP of the invention execute single thread file spread it is defeated, if what file uploaded
Network interruption in the process, when network channel restores, this document can execute breakpoint transmission, and the data transmission for transmission is arrived
Server end guarantees the efficiency of data transmission;
The upper transmitting file received is decrypted in server end, decompression operations, generates original document, calculation server end
The cryptographic Hash of received file is compared with the cryptographic Hash of client file, does integrity verification;
Front and back cryptographic Hash is consistent, and file uploads completely, and upload procedure terminates, and front and back cryptographic Hash is inconsistent, then file transmits
There is packet loss phenomenon in the process, prompts to carry out upload operation again to this document.
Fig. 3 shows a kind of exemplary diagram of big file uploading method according to an embodiment of the invention.
As shown in figure 3, method for uploading when upper transmitting file is big file, comprising:
Client is connected to server end;
File transmission prepares: judging file size, the cryptographic Hash of calculation document (MD5 algorithm), is judged as in the present embodiment
Big file;
Cutting whole into sections is carried out to current big file, i.e., by strategy to file block;
Multithreading file stream encryption, compression are executed based on our self-defining data communication protocol IOCP, i.e., to every block file
Stream is encrypted, is compressed, parallel transmission;
Server end decompresses file stream, decrypts, and blocked file is written;
Server end is to file merged block;
The cryptographic Hash of calculation server end file, makees integrity verification;
When the cryptographic Hash of server file and the cryptographic Hash of client file are consistent, then it is assumed that file transmission is complete, no
There are data packetloss, upload procedure terminates, when the cryptographic Hash of server file and the cryptographic Hash of client file are different
It causes, then has data packetloss in document transmission process, prompt to carry out upload operation again to this document.
The embodiment of the present invention is described above, above description is exemplary, and non-exclusive, and also not
It is limited to disclosed embodiment.Without departing from the scope and spirit of embodiment described, for the art
Those of ordinary skill for many modifications and changes are obvious.The selection of term used herein, it is intended to best
Principle, practical application or the improvement to the technology in market of embodiment are explained in ground, or make the other common of the art
Technical staff can understand embodiments disclosed herein.
Claims (10)
1. a kind of file security transfer management method characterized by comprising
Client and server establishes communication connection, and the client sends file upload request;
After the server end receives request, the server information of the file existing for the server end is inquired, is returned
The client;
The client reads the data information of the file according to the server information, according to the setting of the client
Encryption and compression processing are carried out to the data information of the file, are sent to the server end;
The server end carries out decompression and decryption processing to the file;
The client sends integrity request, and the Kazakhstan of the file is examined after integrity request described in the received server-side
Uncommon value information, and return the client;
The Hash value information that the cryptographic Hash of the client comparison local file and the server end are returned, judges the file
The integrality of transmission.
2. file security transfer management method according to claim 1, wherein judge the integrality packet of the file transmission
It includes:
When the cryptographic Hash of the local file and the Hash value information of the return are consistent, the file is completely uploaded;
When the cryptographic Hash of the local file and the Hash value information of the return are inconsistent, the file is lost, the client
End request uploads the file again.
3. file security transfer management method according to claim 1, wherein the server information includes uploading piece
Section information and received segment initial position information.
4. file security transfer management method according to claim 1, wherein when the file is determined as small documents, hold
The transmission of row single thread.
5. file security transfer management method according to claim 4, wherein the method for single thread transmission includes:
The cryptographic Hash for calculating file to be transmitted is stored in the client, and the file to be transmitted is encrypted and compressed;
When the file to be transmitted uploads, restore again after network interruption, the file to be transmitted can execute breakpoint transmission;
The received server-side is decrypted it and decompresses to the file to be transmitted, generates the cryptographic Hash of return;
The cryptographic Hash for calculating file to be transmitted and the cryptographic Hash of the return compare, and carry out the complete of the file to be transmitted
Property judgement.
6. file security transfer management method according to claim 1, wherein the original document is determined as big file
When, execute multi-threaded parallel transmission.
7. file security transfer management method according to claim 6, wherein execute the method packet of the multi-thread transmission
It includes:
The cryptographic Hash for calculating big file is stored in the client, by the big file division at multiple file fragments;
The multiple file fragment is encrypted and compressed, the server end is sent to;
The multiple file fragment is decrypted and is decompressed in the server end, and the multiple file fragment is merged,
It generates and restores big file, return the cryptographic Hash of the big file of reduction;
The cryptographic Hash of the big file and the cryptographic Hash of the big file of reduction compare, and the integrality for carrying out the big file is sentenced
It is disconnected.
8. file security transfer management method according to claim 1, wherein the cryptographic Hash passes through the eap-message digest
Algorithm is calculated.
9. file security transfer management method according to claim 1, wherein the server end communicates mould using IOCP
Type.
10. a kind of file security transmission and management system utilizes file security transfer tube described in any one of claim 1-8
Reason method, comprising:
Client uploads file to be transmitted;
Server end, the server end and the client, which are established, to be communicated to connect;
Monitoring unit, the monitoring unit receive the upload request of client file to be transmitted;
Processing unit, the processing unit handle the upload request of the file to be transmitted, calculate the text to be transmitted
Cryptographic Hash after part upload;
Storage unit, the storage unit store the cryptographic Hash of the file to be transmitted;
Judging unit, the judging unit judge the size of the file to be transmitted, indicate that the client executing single thread passes
Defeated or execution multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the storage unit with the cryptographic Hash in the processing unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710719512.7A CN109428899A (en) | 2017-08-21 | 2017-08-21 | File security transfer management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710719512.7A CN109428899A (en) | 2017-08-21 | 2017-08-21 | File security transfer management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109428899A true CN109428899A (en) | 2019-03-05 |
Family
ID=65497865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710719512.7A Pending CN109428899A (en) | 2017-08-21 | 2017-08-21 | File security transfer management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109428899A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109947776A (en) * | 2019-03-15 | 2019-06-28 | 海南新软软件有限公司 | A kind of data compression, decompressing method and device |
CN110247986A (en) * | 2019-06-28 | 2019-09-17 | 北京奇艺世纪科技有限公司 | A kind of document transmission method, device and electronic equipment |
CN110401723A (en) * | 2019-08-16 | 2019-11-01 | 北京浪潮数据技术有限公司 | Method, system, equipment and the storage medium of OVA file upload services device |
CN110442442A (en) * | 2019-08-13 | 2019-11-12 | 中国核动力研究设计院 | Nuclear power plant DCS platform engineering teacher's station software safeguards network communication method |
CN110933159A (en) * | 2019-11-27 | 2020-03-27 | 中电装备山东电子有限公司 | File transmission method and system supporting breakpoint continuous transmission |
CN111274252A (en) * | 2020-01-08 | 2020-06-12 | 平安科技(深圳)有限公司 | Block chain data chaining method, device, storage medium and server |
CN111352912A (en) * | 2020-03-10 | 2020-06-30 | Oppo广东移动通信有限公司 | Compressed file processing method, device, storage medium, terminal and server |
CN111726401A (en) * | 2020-06-09 | 2020-09-29 | 北京天空卫士网络安全技术有限公司 | File transmission method and device |
CN112395094A (en) * | 2021-01-19 | 2021-02-23 | 成都四方伟业软件股份有限公司 | Resource initialization downloading method and device based on TPL |
CN112600941A (en) * | 2021-01-20 | 2021-04-02 | 广东金赋科技股份有限公司 | Method, device and storage medium for automatically updating transmission data size optimization |
CN112615899A (en) * | 2020-11-25 | 2021-04-06 | 北京中电普华信息技术有限公司 | Large file transmission method, device and system |
CN112637225A (en) * | 2020-12-28 | 2021-04-09 | 厦门市美亚柏科信息股份有限公司 | Data sending method, data receiving method, client and server |
CN113034194A (en) * | 2021-04-02 | 2021-06-25 | 深圳市英特飞电子有限公司 | Intelligent lamp pole advertisement management method and device, computer equipment and storage medium |
CN113438277A (en) * | 2021-05-28 | 2021-09-24 | 深圳证券通信有限公司 | File receiving and transmitting method for communication system |
CN113495903A (en) * | 2021-09-08 | 2021-10-12 | 西安热工研究院有限公司 | Electric power time sequence database caching method, system, equipment and readable storage medium |
CN113987099A (en) * | 2021-11-02 | 2022-01-28 | 金云数据科技有限公司 | BIM technology-based method for automatically dropping model to GIS |
CN114039971A (en) * | 2021-11-11 | 2022-02-11 | 北京神舟航天软件技术股份有限公司 | Large file concurrent transmission method based on file flow in BS mode |
CN114448975A (en) * | 2022-03-04 | 2022-05-06 | 中国建设银行股份有限公司 | File transmission method, device, equipment and medium |
CN114866533A (en) * | 2022-04-28 | 2022-08-05 | 麦加芯彩新材料科技(上海)股份有限公司 | File uploading method and device and electronic equipment |
CN115037741A (en) * | 2022-08-11 | 2022-09-09 | 中国长江三峡集团有限公司 | File transmission method and device |
CN116702225A (en) * | 2023-06-08 | 2023-09-05 | 重庆傲雄在线信息技术有限公司 | Method, system, equipment and medium for fast verifying electronic archive file based on hash parallel computing |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020141588A1 (en) * | 2001-03-27 | 2002-10-03 | Rollins Doug L. | Data security for digital data storage |
CN1812410A (en) * | 2005-01-25 | 2006-08-02 | 台湾积体电路制造股份有限公司 | File transfer management systems and methods |
CN101360260A (en) * | 2007-07-31 | 2009-02-04 | 广东新支点技术服务有限公司 | Hybrid mobile P2P content sharing system construction suitable for 2.5G/3G mobile data network |
CN103237049A (en) * | 2013-03-18 | 2013-08-07 | 北京易华录信息技术股份有限公司 | File transfer method and device |
CN103442037A (en) * | 2013-08-09 | 2013-12-11 | 华南理工大学 | Method for achieving multithreading breakpoint upload of oversized file based on FTP |
CN106250270A (en) * | 2016-07-28 | 2016-12-21 | 四川新环佳科技发展有限公司 | A kind of data back up method under cloud computing platform |
-
2017
- 2017-08-21 CN CN201710719512.7A patent/CN109428899A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020141588A1 (en) * | 2001-03-27 | 2002-10-03 | Rollins Doug L. | Data security for digital data storage |
CN1812410A (en) * | 2005-01-25 | 2006-08-02 | 台湾积体电路制造股份有限公司 | File transfer management systems and methods |
CN101360260A (en) * | 2007-07-31 | 2009-02-04 | 广东新支点技术服务有限公司 | Hybrid mobile P2P content sharing system construction suitable for 2.5G/3G mobile data network |
CN103237049A (en) * | 2013-03-18 | 2013-08-07 | 北京易华录信息技术股份有限公司 | File transfer method and device |
CN103442037A (en) * | 2013-08-09 | 2013-12-11 | 华南理工大学 | Method for achieving multithreading breakpoint upload of oversized file based on FTP |
CN106250270A (en) * | 2016-07-28 | 2016-12-21 | 四川新环佳科技发展有限公司 | A kind of data back up method under cloud computing platform |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109947776A (en) * | 2019-03-15 | 2019-06-28 | 海南新软软件有限公司 | A kind of data compression, decompressing method and device |
CN110247986A (en) * | 2019-06-28 | 2019-09-17 | 北京奇艺世纪科技有限公司 | A kind of document transmission method, device and electronic equipment |
CN110442442A (en) * | 2019-08-13 | 2019-11-12 | 中国核动力研究设计院 | Nuclear power plant DCS platform engineering teacher's station software safeguards network communication method |
CN110401723A (en) * | 2019-08-16 | 2019-11-01 | 北京浪潮数据技术有限公司 | Method, system, equipment and the storage medium of OVA file upload services device |
CN110933159A (en) * | 2019-11-27 | 2020-03-27 | 中电装备山东电子有限公司 | File transmission method and system supporting breakpoint continuous transmission |
CN111274252B (en) * | 2020-01-08 | 2023-11-28 | 平安科技(深圳)有限公司 | Block chain data uplink method and device, storage medium and server |
CN111274252A (en) * | 2020-01-08 | 2020-06-12 | 平安科技(深圳)有限公司 | Block chain data chaining method, device, storage medium and server |
CN111352912A (en) * | 2020-03-10 | 2020-06-30 | Oppo广东移动通信有限公司 | Compressed file processing method, device, storage medium, terminal and server |
CN111352912B (en) * | 2020-03-10 | 2024-04-12 | Oppo广东移动通信有限公司 | Compressed file processing method, device, storage medium, terminal and server |
CN111726401A (en) * | 2020-06-09 | 2020-09-29 | 北京天空卫士网络安全技术有限公司 | File transmission method and device |
CN111726401B (en) * | 2020-06-09 | 2023-05-26 | 北京天空卫士网络安全技术有限公司 | File transmission method and device |
CN112615899A (en) * | 2020-11-25 | 2021-04-06 | 北京中电普华信息技术有限公司 | Large file transmission method, device and system |
CN112637225A (en) * | 2020-12-28 | 2021-04-09 | 厦门市美亚柏科信息股份有限公司 | Data sending method, data receiving method, client and server |
CN112395094A (en) * | 2021-01-19 | 2021-02-23 | 成都四方伟业软件股份有限公司 | Resource initialization downloading method and device based on TPL |
CN112600941A (en) * | 2021-01-20 | 2021-04-02 | 广东金赋科技股份有限公司 | Method, device and storage medium for automatically updating transmission data size optimization |
CN112600941B (en) * | 2021-01-20 | 2023-04-18 | 广东金赋科技股份有限公司 | Method, device and storage medium for automatically updating transmission data size optimization |
CN113034194B (en) * | 2021-04-02 | 2024-05-17 | 深圳市英特飞电子有限公司 | Intelligent lamp post advertisement management method, intelligent lamp post advertisement management device, computer equipment and storage medium |
CN113034194A (en) * | 2021-04-02 | 2021-06-25 | 深圳市英特飞电子有限公司 | Intelligent lamp pole advertisement management method and device, computer equipment and storage medium |
CN113438277A (en) * | 2021-05-28 | 2021-09-24 | 深圳证券通信有限公司 | File receiving and transmitting method for communication system |
CN113495903A (en) * | 2021-09-08 | 2021-10-12 | 西安热工研究院有限公司 | Electric power time sequence database caching method, system, equipment and readable storage medium |
CN113495903B (en) * | 2021-09-08 | 2021-12-17 | 西安热工研究院有限公司 | Electric power time sequence database caching method, system, equipment and readable storage medium |
CN113987099B (en) * | 2021-11-02 | 2024-01-30 | 金云数据科技有限公司 | BIM technology-based method for automatically falling model to GIS |
CN113987099A (en) * | 2021-11-02 | 2022-01-28 | 金云数据科技有限公司 | BIM technology-based method for automatically dropping model to GIS |
CN114039971A (en) * | 2021-11-11 | 2022-02-11 | 北京神舟航天软件技术股份有限公司 | Large file concurrent transmission method based on file flow in BS mode |
CN114448975A (en) * | 2022-03-04 | 2022-05-06 | 中国建设银行股份有限公司 | File transmission method, device, equipment and medium |
CN114866533A (en) * | 2022-04-28 | 2022-08-05 | 麦加芯彩新材料科技(上海)股份有限公司 | File uploading method and device and electronic equipment |
CN115037741A (en) * | 2022-08-11 | 2022-09-09 | 中国长江三峡集团有限公司 | File transmission method and device |
CN115037741B (en) * | 2022-08-11 | 2022-11-15 | 中国长江三峡集团有限公司 | File transmission method and device |
CN116702225A (en) * | 2023-06-08 | 2023-09-05 | 重庆傲雄在线信息技术有限公司 | Method, system, equipment and medium for fast verifying electronic archive file based on hash parallel computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109428899A (en) | File security transfer management method and system | |
CN109347835B (en) | Information transmission method, client, server, and computer-readable storage medium | |
CN111555872B (en) | Communication data processing method, device, computer system and storage medium | |
CN106209606B (en) | A kind of method, terminal and system for using WEB mail safely | |
CN102882974B (en) | Method for saving website access resource by website identification version number | |
US10764261B2 (en) | System and method for enabling a scalable public-key infrastructure on a smart grid network | |
US7739301B2 (en) | Method and apparatus for improving file system proxy performance and security by distributing information to clients via file handles | |
CN112615899A (en) | Large file transmission method, device and system | |
CN106878024B (en) | A kind of verifying code check method and system based on caching | |
CN101552669A (en) | Method and system of data transmission | |
CN112689014B (en) | Double-full-work communication method, device, computer equipment and storage medium | |
CN115134087B (en) | Client secure data deduplication method for decentralized cloud storage | |
CN105141635A (en) | Method and system for safe communication of group sending messages | |
CN111488604A (en) | Data desensitization system and data desensitization method | |
CN109729000B (en) | Instant messaging method and device | |
CN111181920A (en) | Encryption and decryption method and device | |
CN110224824B (en) | Digital certificate processing method and device, computer equipment and storage medium | |
CN104301102B (en) | Widget communication means, apparatus and system | |
CA2587815A1 (en) | In-memory compression and encryption | |
CN109218009B (en) | Method, client and server for improving equipment ID security | |
CN104917763A (en) | PIN code caching method | |
CN112565156A (en) | Information registration method, device and system | |
US20130024543A1 (en) | Methods for generating multiple responses to a single request message and devices thereof | |
CN111835519A (en) | Covert communication method based on public block chain | |
CN115426403A (en) | Data processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190305 |